Author: eri
Date: Fri Mar 24 00:55:16 2017
New Revision: 315877
URL: https://svnweb.freebsd.org/changeset/base/315877
Log:
Correct handling of ALTQ with epair(4) interfaces but presenting that ALTQ(9)
is supported.
Approved by: ae
MFC after:2 weeks
Modified:
On Tue, Mar 14, 2017 at 2:57 PM, Gleb Smirnoff wrote:
> Kristof,
>
> On Sun, Mar 12, 2017 at 05:42:57AM +, Kristof Provost wrote:
> K> Log:
> K> pf: Fix incorrect rw_sleep() in pf_unload()
> K>
> K> When we unload we don't hold the pf_rules_lock, so we cannot call
Author: eri
Date: Mon Mar 6 04:01:58 2017
New Revision: 314722
URL: https://svnweb.freebsd.org/changeset/base/314722
Log:
The patch provides the same socket option as Linux IP_ORIGDSTADDR.
Unfortunately they will have different integer value due to Linux value being
already assigned in
Author: eri
Date: Sun Feb 12 06:56:33 2017
New Revision: 313675
URL: https://svnweb.freebsd.org/changeset/base/313675
Log:
Committed without approval from mentor.
Reported by: gnn
Modified:
head/sys/netinet/in.h
head/sys/netinet/in_pcb.c
head/sys/netinet/in_pcb.h
Author: eri
Date: Fri Feb 10 06:20:27 2017
New Revision: 313530
URL: https://svnweb.freebsd.org/changeset/base/313530
Log:
Use proper value for socket option on IPv6
Reported-by: ohartm...@walstatt.org
Modified:
head/sys/netinet6/in6.h
Modified: head/sys/netinet6/in6.h
Author: eri
Date: Fri Feb 10 06:01:47 2017
New Revision: 313529
URL: https://svnweb.freebsd.org/changeset/base/313529
Log:
Fix build after r313524
Reported-by: ohartm...@walstatt.org
Modified:
head/sys/netinet/udp_usrreq.c
Modified: head/sys/netinet/udp_usrreq.c
Author: eri
Date: Fri Feb 10 05:58:16 2017
New Revision: 313528
URL: https://svnweb.freebsd.org/changeset/base/313528
Log:
Revert r313527
Heh svn is not git
Modified:
head/sys/netinet/in_pcb.c
head/sys/netinet/in_pcb.h
head/sys/netinet/tcp_usrreq.c
head/sys/netinet/udp_usrreq.c
Author: eri
Date: Fri Feb 10 05:51:39 2017
New Revision: 313527
URL: https://svnweb.freebsd.org/changeset/base/313527
Log:
Correct missed variable name.
Reported-by: ohartm...@walstatt.org
Modified:
head/sys/netinet/in_pcb.c
head/sys/netinet/in_pcb.h
head/sys/netinet/tcp_usrreq.c
Author: eri
Date: Fri Feb 10 05:16:14 2017
New Revision: 313524
URL: https://svnweb.freebsd.org/changeset/base/313524
Log:
The patch provides the same socket option as Linux IP_ORIGDSTADDR.
Unfortunately they will have different integer value due to Linux value being
already assigned in
On Sun, Aug 23, 2015 at 12:34 AM, Luiz Otavio O Souza loos...@gmail.com
wrote:
On Sat, Aug 22, 2015 at 6:18 AM, Ermal Luçi wrote:
On Sat, Aug 22, 2015 at 12:02 AM, Luiz Otavio O Souza
wrote:
Author: loos
Date: Fri Aug 21 22:02:22 2015
New Revision: 287009
URL: https
On Sat, Aug 22, 2015 at 12:02 AM, Luiz Otavio O Souza l...@freebsd.org
wrote:
Author: loos
Date: Fri Aug 21 22:02:22 2015
New Revision: 287009
URL: https://svnweb.freebsd.org/changeset/base/287009
Log:
Add ALTQ(9) support for the CoDel algorithm.
CoDel is a parameterless queue
. :)
-a
On 6 August 2015 at 00:21, Ermal Luçi ermal.l...@gmail.com wrote:
I did the port for pfSense and the whole stack works from HEAD into
10-STABLE.
Just minor modifications were required.
If you want i can try to send the diff.
On Wed, Aug 5, 2015 at 11:55 PM, Oliver Pinter
I did the port for pfSense and the whole stack works from HEAD into
10-STABLE.
Just minor modifications were required.
If you want i can try to send the diff.
On Wed, Aug 5, 2015 at 11:55 PM, Oliver Pinter
oliver.pin...@hardenedbsd.org wrote:
Yup. :) If you need testers with the backport,
On Sun, Aug 2, 2015 at 8:40 PM, Mark Johnston ma...@freebsd.org wrote:
On Wed, Jul 29, 2015 at 06:04:02PM +, Ermal Luçi wrote:
Author: eri
Date: Wed Jul 29 18:04:01 2015
New Revision: 286028
URL: https://svnweb.freebsd.org/changeset/base/286028
Log:
ip_output normalization
Hello Olivier,
its strange seeing so much contention on the arp tables on your PMC stats.
Do you run ping(to prepopulate arp) or static arp to remove the noise from
that interaction?
Also do you run with flowtable active?
On Mon, Aug 3, 2015 at 3:06 PM, Olivier Cochard-Labbé oliv...@cochard.me
On Mon, Aug 3, 2015 at 5:18 PM, Olivier Cochard-Labbé oliv...@cochard.me
wrote:
On Mon, Aug 3, 2015 at 5:05 PM, Ermal Luçi e...@freebsd.org wrote:
Hello Olivier,
its strange seeing so much contention on the arp tables on your PMC stats.
Do you run ping(to prepopulate arp) or static arp
Author: eri
Date: Thu Jul 30 20:56:27 2015
New Revision: 286095
URL: https://svnweb.freebsd.org/changeset/base/286095
Log:
Correct IPSec SA statistic keeping
The IPsec SA statistic keeping is used even for decision making on
expiry/rekeying SAs.
When there are multiple transformations
On Wed, Jul 29, 2015 at 6:48 PM, George Neville-Neil g...@neville-neil.com
wrote:
On 29 Jul 2015, at 11:05, Gleb Smirnoff wrote:
Ermal,
On Wed, Jul 29, 2015 at 03:00:59PM +0200, Ermal Luçi wrote:
E E @@ -934,6 +950,7 @@ ip_forward(struct mbuf *m, int srcrt)
E E */
E E
On Wed, Jul 29, 2015 at 5:40 PM, John-Mark Gurney j...@funkthat.com wrote:
Ermal Lui wrote this message on Wed, Jul 29, 2015 at 14:53 +0200:
this was forgotten part on my patches merge from gnn@.
Can it be fixed by correcting the patches rather than re-introducing
this?
Most probably
Author: eri
Date: Wed Jul 29 18:04:01 2015
New Revision: 286028
URL: https://svnweb.freebsd.org/changeset/base/286028
Log:
ip_output normalization and fixes
ip_output has a big chunk of code used to handle special cases with pfil
consumers which also forces a reloop on it.
Gather all
Author: eri
Date: Wed Jul 29 20:10:36 2015
New Revision: 286037
URL: https://svnweb.freebsd.org/changeset/base/286037
Log:
Avoid double reference decrement when firewalls force relooping of packets
When firewalls force a reloop of packets and the caller supplied a route the
reference to
Hello John-Mark,
this was forgotten part on my patches merge from gnn@.
Can it be fixed by correcting the patches rather than re-introducing this?
Most probably the constant definition is wrong on the transforms and also
some part of code removal was missed.
On Wed, Jul 29, 2015 at 9:15 AM,
On Tue, Jul 28, 2015 at 2:42 PM, Gleb Smirnoff gleb...@freebsd.org wrote:
Ermal,
see comments inlined,
On Thu, Jul 02, 2015 at 06:10:42PM +, Ermal Luçi wrote:
E Author: eri
E Date: Thu Jul 2 18:10:41 2015
E New Revision: 285051
E URL: https://svnweb.freebsd.org/changeset/base
Author: eri
Date: Tue Jul 21 21:46:24 2015
New Revision: 285770
URL: https://svnweb.freebsd.org/changeset/base/285770
Log:
IPSEC, remove variable argument function its already due.
Differential Revision:https://reviews.freebsd.org/D3080
Reviewed by: gnn, ae
Approved
Author: eri
Date: Thu Jul 9 16:28:36 2015
New Revision: 285325
URL: https://svnweb.freebsd.org/changeset/base/285325
Log:
Correct issue presented in r285051,
apparently neither clang nor gcc complain about this.
But clang intis the var to NULL correctly while gcc on at least mips does not.
Author: eri
Date: Fri Jul 3 15:31:56 2015
New Revision: 285096
URL: https://svnweb.freebsd.org/changeset/base/285096
Log:
Reduce overhead of IPSEC for traffic generated from host
When IPSEC is enabled on the kernel the forwarding path has an optimization
to not enter the code paths
for
On Thu, Jul 2, 2015 at 7:31 PM, Renato Botelho ga...@freebsd.org wrote:
Author: garga (ports committer)
Date: Thu Jul 2 17:30:59 2015
New Revision: 285050
URL: https://svnweb.freebsd.org/changeset/base/285050
Log:
When passwd or group information is changed (by pw, vipw, chpass, ...)
Author: eri
Date: Thu Jul 2 18:10:41 2015
New Revision: 285051
URL: https://svnweb.freebsd.org/changeset/base/285051
Log:
Avoid doing multiple route lookups for the same destination IP during
forwarding
ip_forward() does a route lookup for testing this packet can be sent to a
known
On Fri, Jun 26, 2015 at 1:16 AM, Bjoern A. Zeeb b...@freebsd.org wrote:
Author: bz
Date: Thu Jun 25 23:16:01 2015
New Revision: 284863
URL: https://svnweb.freebsd.org/changeset/base/284863
Log:
Another attempt to make this compile on more architectures after r284777.
Modified:
Fixed.
On Thu, Jun 25, 2015 at 11:00 AM, Ermal Luçi e...@freebsd.org wrote:
On Thu, Jun 25, 2015 at 10:42 AM, Bjoern A. Zeeb b...@freebsd.org wrote:
On 24 Jun 2015, at 19:16 , Ermal Luçi e...@freebsd.org wrote:
Author: eri
Date: Wed Jun 24 19:16:41 2015
New Revision: 284777
URL
On Thu, Jun 25, 2015 at 10:42 AM, Bjoern A. Zeeb b...@freebsd.org wrote:
On 24 Jun 2015, at 19:16 , Ermal Luçi e...@freebsd.org wrote:
Author: eri
Date: Wed Jun 24 19:16:41 2015
New Revision: 284777
URL: https://svnweb.freebsd.org/changeset/base/284777
Log:
ALTQ FAIRQ
Author: eri
Date: Thu Jun 25 15:05:58 2015
New Revision: 284814
URL: https://svnweb.freebsd.org/changeset/base/284814
Log:
Correct r284777 to use proper includes and remove dead code to unbreak kernel
builds.
Differential Revision:https://reviews.freebsd.org/D2847
Modified:
Author: eri
Date: Wed Jun 24 19:16:41 2015
New Revision: 284777
URL: https://svnweb.freebsd.org/changeset/base/284777
Log:
ALTQ FAIRQ discipline import from DragonFLY
Differential Revision: https://reviews.freebsd.org/D2847
Reviewed by:glebius, wblock(manpage)
Approved by:
Author: eri
Date: Wed Jun 17 12:23:04 2015
New Revision: 284512
URL: https://svnweb.freebsd.org/changeset/base/284512
Log:
If there is a system with a bpf consumer running and a packet is wanted
to be transmitted but the arp cache entry expired, which triggers an arp
request
to be sent,
Hello Andrey,
do you plan to MFC this one?
On Tue, Apr 28, 2015 at 11:29 AM, Andrey V. Elsukov a...@freebsd.org wrote:
Author: ae
Date: Tue Apr 28 09:29:28 2015
New Revision: 282132
URL: https://svnweb.freebsd.org/changeset/base/282132
Log:
Since PFIL can change mbuf pointer, we should
On Thu, Jan 8, 2015 at 1:21 AM, Bjoern A. Zeeb
bzeeb-li...@lists.zabbadoz.net wrote:
On 07 Jan 2015, at 20:46 , Gleb Smirnoff gleb...@freebsd.org wrote:
On Tue, Jan 06, 2015 at 09:03:04AM +, Craig Rodrigues wrote:
C Author: rodrigc
C Date: Tue Jan 6 09:03:03 2015
C New
On Tue, Nov 25, 2014 at 3:14 PM, Dag-Erling Smørgrav d...@des.no wrote:
Ermal Luçi e...@freebsd.org writes:
Also this only affects the traffic sourced by the host itself and not
forwarded traffic and I think this patch will provide a regression for
the issues that the committed patch does
Hello Dag,
if its working for you i have no issues.
For me these changes are taken into consideration during policy routing on
pf(4).
If you check the pf_route() call it does the same checks as outgoing
processing of the modules.
If they need to be considered after pf(4) does it internal
Author: eri
Date: Wed Nov 19 13:31:08 2014
New Revision: 274709
URL: https://svnweb.freebsd.org/changeset/base/274709
Log:
pf(4) needs to have a correct checksum during its processing.
Calculate checksums for the IPv6 path when needed before
delving into pf(4) code as required.
PR:
On Wed, Feb 19, 2014 at 4:32 PM, Gleb Smirnoff gleb...@freebsd.org wrote:
Martin,
M On Tue, Feb 18, 2014 at 10:17:12PM +, Martin Matuska wrote:
M M Author: mm
M M Date: Tue Feb 18 22:17:12 2014
M M New Revision: 262196
M M URL: http://svnweb.freebsd.org/changeset/base/262196
M
Thanks, i actually forgot to submit this.
On Thu, Apr 26, 2012 at 7:35 PM, Bernhard Schmidt bschm...@freebsd.org wrote:
Author: bschmidt
Date: Thu Apr 26 17:35:11 2012
New Revision: 234711
URL: http://svn.freebsd.org/changeset/base/234711
Log:
fix EAP server support after the 0.7.3
You are sure that the defer feature is linked only to active-active?
2012/4/3 Gleb Smirnoff gleb...@freebsd.org:
On Tue, Apr 03, 2012 at 06:09:21PM +, Gleb Smirnoff wrote:
T Author: glebius
T Date: Tue Apr 3 18:09:20 2012
T New Revision: 233846
T URL:
Maybe it does not hurt in general to keep the V_
Some work was done to add it, no?!
On Tue, Jan 17, 2012 at 1:14 PM, Gleb Smirnoff gleb...@freebsd.org wrote:
Author: glebius
Date: Tue Jan 17 12:14:26 2012
New Revision: 230265
URL: http://svn.freebsd.org/changeset/base/230265
Log:
2012/1/17 Gleb Smirnoff gleb...@freebsd.org
On Tue, Jan 17, 2012 at 05:48:10PM +0100, Ermal Lu?i wrote:
E Maybe it does not hurt in general to keep the V_
E Some work was done to add it, no?!
The V_ has been left under __FreeBSD__.
E On Tue, Jan 17, 2012 at 1:14 PM, Gleb Smirnoff
You ARE testing this right?
Since you removed code that you do not actually mention at all in the
commit message!!!
On Mon, Jan 9, 2012 at 9:50 AM, Gleb Smirnoff gleb...@freebsd.org wrote:
Author: glebius
Date: Mon Jan 9 08:50:22 2012
New Revision: 229850
URL:
On Wed, Oct 19, 2011 at 1:04 PM, Bjoern A. Zeeb b...@freebsd.org wrote:
Author: bz
Date: Wed Oct 19 11:04:49 2011
New Revision: 226536
URL: http://svn.freebsd.org/changeset/base/226536
Log:
De-virtualize the pf_task_mtx lock. At the current state of pf locking
and virtualization it is
46 matches
Mail list logo